A Use After Free vulnerability in the Advanced Forwarding Toolkit (AFT) manager process (aftmand) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause a kernel crash due to intensive polling of Abstracted Fabric (AF) interface statistics and thereby a Denial of Service (DoS). Continued gathering of AF interface statistics will create a sustained Denial of Service (DoS) condition. This issue affects Juniper Networks Junos OS on MX Series: 20.1 versions later than 20.1R1; 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2; 21.2 versions prior to 21.2R2.
References
Link | Resource |
---|---|
https://kb.juniper.net/JSA69711 | Vendor Advisory |
https://kb.juniper.net/JSA69711 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://kb.juniper.net/JSA69711 - Vendor Advisory |
Information
Published : 2022-07-20 15:15
Updated : 2024-11-21 06:46
NVD link : CVE-2022-22207
Mitre link : CVE-2022-22207
CVE.ORG link : CVE-2022-22207
JSON object : View
Products Affected
juniper
- mx2008
- mx40
- mx150
- mx10016
- mx5
- mx960
- mx10008
- mx80
- mx10000
- mx10
- junos
- mx104
- mx10003
- mx2020
- mx2010
- mx240
- mx480
- mx204
CWE
CWE-416
Use After Free